Best Compliance Software in the USA - Page 60

Compare the Top Compliance Software in the USA as of May 2026 - Page 60

  • 1
    NavigateHCR

    NavigateHCR

    NavigateHCR

    NavigateHCR offers affordable solutions that improve efficiency by eliminating the need to have on internal resource collect and distribute communications. NavigateHCR provides two specialized products for communications. EmployER Express and EmployEE Express are powerful tools allowing mass distribution of mandatory notices. NavigateHCR will manage, through the Premium Only Plan (POP), the deductions of the employees' portion of the company-sponsored insurance premium. NavigateHCR will create a Section 125 so employees may elect which benefits they would like to have pre-tax from payroll. NavigateHCR provides tools for proactive decision making with regards to employee tracking and reporting. Monthly tracks your variable hour employee data and provides easy to read dashboards and ACA Alerts based on hours. IRS has the ability to quickly collect data to respond to inquiries from government agencies and annual filings on your behalf (1094 and 1095 filings).
  • 2
    Wolters Kluwer Wiz

    Wolters Kluwer Wiz

    Wolters Kluwer Legal & Regulatory US

    CRA compliance has become a major undertaking, consuming endless hours of staff time and management attention. It’s hard to know how your lending performance will look to examiners. You may not even have the necessary information to demonstrate your institution’s real performance level. Our CRA and HMDA solutions allow you to proactively implement processes and controls. With technology, outsourcing, consulting or a combination of all three, you can build a cost-effective CRA program that matches the strategic plan of the institution, ensures lending throughout the community, and meets regulatory expectations. Managing fair lending compliance across your entire organization is a daunting task. It requires thorough monitoring of diverse loan portfolios and third-party loan originators for CRA, HMDA, ECOA and FHA violations. If you don't have a comprehensive fair lending program in place, you're risking serious consequences.
  • 3
    Patrol Points

    Patrol Points

    Condo Control

    Patrol Points is a cutting-edge security guard tour system solution from Condo Control designed to improve and streamline the patrol guard checkpoint experience using cloud-based NFC technology from the convenience of a smartphone or tablet. Security guards can create routes and interactive checkpoints around the premises, lodge incident reports on the spot, schedule and notify security staff of upcoming patrols, sync patrol reports directly to the security dashboard in real-time, and more. Our cloud-based technology is dependable and simple to use, with off-line accessibility if there isn’t a network connection, and remote access to organize and monitor security on the go.
  • 4
    Cyscale

    Cyscale

    Cyscale

    Map, secure, and monitor your cloud assets across platforms in under 5 minutes. Optimize operations and costs with an agentless CSPM solution that uses our Security Knowledge Graph™ to ensure scalable, consistent protection and governance. Specialists across industries rely on Cyscale to apply their expertise where it makes the biggest difference. We help you see through infrastructure layers and scale your efforts to organization-wide impact. Bridge multiple environments with Cyscale and visualise your cloud inventory in full. Discover unused, forgotten cloud resources and eliminate them to get smaller invoices from cloud providers and optimize costs for the whole organization. See accurate correlations across all cloud accounts and assets as soon as you sign up and act on alerts to avoid fines for data breaches.
  • 5
    Caveonix

    Caveonix

    Caveonix

    Traditional enterprise security and compliance solutions tend to be unscalable within hybrid and multi-cloud environments. As other “cloud-native” solutions frequently leave existing data centers behind, it can be difficult for teams to secure their enterprise’s hybrid computing operating environments. From infrastructure and services to applications and workloads, your teams can confidently protect all your cloud environments. Created by industry veterans that know digital risk and compliance inside and out, Caveonix RiskForesight is a platform trusted by our customers and partners that provides proactive workload protection. Detect, Predict and Act on threats that occur in your technology stack and hybrid cloud environments. Automate your digital risk and compliance processes, and proactively protect your hybrid and multi-cloud environments. Implement cloud security posture management and cloud workload protection, as defined by Gartner's standards.
  • 6
    Workiva

    Workiva

    Workiva

    Connect your enterprise to single-source clarity. Automate processes. Take control of data transformation. You didn’t get into this work to do menial tasks. We built a platform that does the things technology should be doing and frees you up to focus on what you love. Have an impact, not a headache. Spend your time on the things that matter most. Make numbers meaningful with more context. Create shared datasets that are always up to date. Don’t create another rogue spreadsheet, build reusable assets for your organization. Collaboration, but for sources of data. Connect and combine data from any source. Create reusable datasets. Have the right answers ready, for everybody. Because you don’t have to anymore. Our platform automates tedious, manual stuff like gathering data, updating numbers and narrative, keeping up with changes, managing approvals, and more. Is it magic? Maybe.
  • 7
    Cleanup for z/OS
    Broadcom Cleanup for z/OS is a mainframe security solution designed to automate the cleanup and management of security files within z/OS environments. The platform continuously monitors mainframe identities and entitlements to identify unused or outdated access rights that may create security risks. It helps organizations maintain stronger compliance with regulations related to information security, privacy, and data protection. Cleanup for z/OS reduces administrative overhead by removing obsolete user IDs and unnecessary security definitions from the system. The solution improves security recertification processes by tracking active and inactive access across users and applications. By automating continuous monitoring and cleanup tasks, Broadcom helps enterprises strengthen security controls while improving mainframe performance and operational efficiency.
  • 8
    Thomson Reuters Compliance Learning
    Discover customized online training and provide employees with the tools and knowledge to build a culture of compliance. Employing instructional design techniques optimized for risk and compliance training our courses are driven by practical examples and interactive scenarios. They’re tailored to support your business at a country, regional, and global level supported in over 25 languages and with full audit trail capabilities. Content for our course library is powered by world-leading regulatory intelligence and courses are updated in response to the latest regulatory and legislative changes. Our courses are fully customizable and scalable to fit the exact learning objectives set by your business. We offer a range of options and courses can be built from scratch to fit your business requirements on any governance, risk and compliance topics.
  • 9
    RUBiQ

    RUBiQ

    RUBiQ

    RUBIQ is a cloud-based platform utilizing the latest technologies to deliver a truly unique, comprehensive and dynamic Governance, Risk and Compliance (“GRC”) management system for any size organization, anywhere in the world. RUBIQ is quickly implemented, efficient to use, and affordable to organizations of all sizes. Easy establishment of customer maturity against standards, regulations and best practice. Benchmark against peers in sector or country (coming soon). Quicker to implement, resource light and more affordable than the competition (i.e. High Return on Investment). Combined gap assessments, intuitive workflows, on-demand advisory, policy and risk libraries and high configurability results in an easy to use and friendly platform. Connect with subject matter experts in an instant. Identify probable cause of incidents and the risks they relate to. Determine the probability of achieving objectives. Constantly evolving AI does the hard work.
  • 10
    HealthSafe

    HealthSafe

    HealthSafe

    HealthSafe dynamicRMS supports environmental, quality and safety and all on the most innovative and cost-effective platform unrivaled across Australasia! Welcome to the future of safety to protect your people. Access your electronic documents with no app to compliment your business operation and save significantly financially whilst improving your health and safety culture. HealthSafe is serious about health and safety and lead Australasia businesses in ensuring their greatest assets return home safe at the end of their working shift. Cyberattacks are real and happening daily accessing your business information. HealthSafe is ISO:27001 Certified Protecting Your Data. HealthSafe replace archiac pricing models dictated by user licences and costly set-up fees. No more apps, no more changing usernames and passwords and easy access to all electronic forms complimenting any business environment.
  • 11
    SafetyQube

    SafetyQube

    Quber Tech

    SafetyQube is an intuitive and affordable EHS (Environment, Health, and Safety) software designed to streamline safety management across industries. The platform offers a comprehensive suite of features including hazard capture, risk identification, incident reporting, and real-time updates on safety performance. It helps businesses automate and digitize their EHS processes, reducing administrative workload and increasing efficiency. SafetyQube simplifies compliance with audits, inspections, and documentation, all while generating valuable insights for continuous improvement. Its user-friendly interface and real-time dashboards make it easy for businesses to enhance safety culture and reduce costs associated with incidents, downtime, and insurance.
  • 12
    True Office Learning

    True Office Learning

    True Office Learning

    The True Office Learning ecosystem was designed to make every employee his or her most compliant and ethical self. Through a set of complementary products that go beyond training, our mission is to help employees truly learn. This ecosystem is a balance of adaptive training courses and modules, videos, microlearning events, operationalization toolkits, and diagnostics, all linked together by an award-winning behavioral analytics portal. Scholar helps companies return thousands of productive revenue-generating hours back into the business. I.Q. analyzes training data points and transforms them into predictive insights through the easy-to-use analytics dashboard. Poet is an intuitive and flexible customization experience that lets you personalize Scholar's content, imagery, and multimedia. Learn I.O. is the LMS you deserve, intuitive, frustration free, and capable of handling even the most complex programs.
  • 13
    Impact Compliance Training

    Impact Compliance Training

    Impact Compliance Training

    To ensure you’re meeting the latest state law training mandates and that the coursework is relevant to your business, we adapt our course curriculum to your state’s compliance requirements and industry. With new training requirements in California, New York, and Illinois, the complexity of meeting these mandates has never been more challenging. Proactive legal updates, automated administrative tools, electronic tracking and reporting, and state law version control are some of the ways that we help our customers provide training in a scalable and efficient way so that this isn't anyone's full-time job. With over 25 years of compliance training expertise and hundreds of organizations served, our team has created a multitude of course versions around impactful real-world scenarios that include profound insights about workplace harassment and discrimination law that most sexual harassment training providers overlook.
  • 14
    Pole Star PurpleTRAC
    The sanctions landscape, inherently guided by the state of global affairs, has never been more complex and rapidly evolving. With regulators now focusing on the entire maritime trade supply chain, ensuring that proper due diligence and risk management processes are in place has never been more important. Regulatory risk can be associated with all aspects of a trade transaction: the goods being traded, the origin of the goods, the buyers and sellers, the cities and ports along the shipping route, and the shipping vessels themselves. Designed with and for companies with regulatory exposures in maritime trade and shipping, PurpleTRAC enables the automation, streamlining, and recording of your regulatory processes and mitigates the risk of money laundering and terrorist financing, alongside the criminal, reputational, and commercial damage that would occur as a result of noncompliance.
  • 15
    Intellicta

    Intellicta

    TechDemocracy

    Intellicta, TechDemocracy’s brain child, is the first of its kind to deliver a holistic assessment of an entity’s cybersecurity, compliance, risk and governance. It is a singular product capable of predicting potential financial liabilities caused by threats posed by vulnerabilities in cyberspace. Intellicta empowers senior, non-technical business decision-makers to understand, evaluate and measure the effectiveness of their existing cybersecurity, governance, risk, and compliance programs. The platform can be customized to meet every company's unique business requirement. It leverages quantifiable metrics based on established models from ISM3, NIST, and ISO, among others to provide solutions. Intellicta boasts of open-source architecture that aggregates and analyzes every facet of an enterprise’s unique ecosystem, so that it can be integrated and monitored continuously. It can extract critical data from cloud-based, on-premises and third-party systems.
  • 16
    Regology

    Regology

    Regology

    First of its kind - we have codified human legal intelligence, scaled millions of laws, established billions of links between them, and mapped them to compliance objects. Let Regology identify the impact of regulatory changes and save hundreds of hours. Smart law library that keeps your regulatory content up-to-date. All relevant updates and actionable content at your fingertips. Deep compliance functionality connected to your smart library. Intelligence that automatically tracks progression through the law making process. Regology's standard citation lets the AI Engine track interconnected legal systems within and across jurisdictions. Definitions, requirements, and scope of applicability improves readability and understanding of the text. Multiple jurisdictions and agencies combined with intelligence leads to a new era of research and compliance.
  • 17
    Pontus Vision

    Pontus Vision

    Pontus Vision

    We extract personal data through hundreds of integrations into database, CRM, ERP and proprietary systems. Including unstructured data such as emails, PDFs, Word and spreadsheets. We map data by tracking all Extract step locations, identifying customer data with as little information as possible, supporting billions of records. Consolidation of all data, resulting in a graphic or textual view of the risks of all the organization's databases, using a score based on 12 steps, following the main points of the LGPD. Our solution does not rely on any specific technology from the cloud provider. The solution can be deployed at on-premises data centers, or at any cloud provider. Pontus Vision LGPD's architecture has minimal manual steps to allow large amounts of data to be processed. The solution supports flow of billions of records. Pontus Vision LGPD was designed and built as a modular solution that is capable of taking data from hundreds of different formats.
  • 18
    PrivaCIL

    PrivaCIL

    PrivaCIL

    The new European regulation on the protection of personal data (RGPD) 2018 requires a significant amount of constraints to be dealt with on a daily basis by your internal or external manager (DPO) before May 25, 2018. The Privacil software makes it possible to manage all of these constraints with ease. The Privacil-DPMS software with its ergonomics recognized by its customers is a simple interface which makes it possible to follow very easily all the procedures and actions that you have to carry out for the GDPR 2018 . Its graphic and thought-out dashboards inform you at a glance about the state of your compliance with the GDPR 2018. With a renewal rate of 98%, Privacil has the recognition of its customers. With a clear and practical software interface, Privacil has been designed by GDPR experts to optimize the management of personal data of your organization / institution / company / group whatever its size and organization.
  • 19
    Control.My.ID

    Control.My.ID

    Control.My.ID

    Control.My.ID for Consumers works by collecting information from numerous online sources to provide you a comprehensive view of your privacy and data security. You can monitor and review this data then decide what you want to do about it! Control.My.ID for Enterprises ensures your company is meeting all privacy regulations and keeps an auditable trail for you. Manage all your Data Subject Requests in one place, ensure they are being handled, and become more efficient and ensure regulatory compliance. It’s not easy managing your enterprise. Each state is enacting their own laws and all have different laws and regulations around consumer PII. Each region has their own rules about how you treat your customer’s data such as the CCPA/CPRA in California or the ADD Act at the US federal level or the GDPR in the European Union. Control.My.ID can also help with privacy by design decisions and privacy impact assessments.
    Starting Price: $8 per month
  • 20
    trust-hub

    trust-hub

    trust-hub

    trust-hub is an innovative, hosted platform that enables organizations to capitalize on shifts in the data protection and privacy landscape. The unique framework offers secure storage, processing and rights management for personal data on a case-by-case basis and is designed to support data protection and privacy regulations, including GDPR. Create secure and universally accessible personal data sets in accordance with GDPR. Encrypt and pseudonymize each customer and employee data item uniquely. Store personal data in one of the world’s most secure data storage facilities. Rapidly retrieve personal data as and when required. Increase productivity and efficiency across your organization. Enable accredited individuals and teams to access and share data easily and securely. Provide your Data Protection Officer (DPO) with the tools required to operate effectively. Exploit digital and commercial innovations by facilitating the safe flow of consent-driven customer data.
  • 21
    Wrangu Privacy Hub
    Our Data Privacy Management Software, Privacy Hub, combines the flexibility to meet your business needs, whilst creating efficiencies to drive your ROI, and delivering transparency to keep the board happy. We have a suite of Data Privacy Management software and solutions to aid your privacy compliance journey. We support your business as you mature on your privacy management journey. Global privacy laws like the GDPR, CCPA, and others, have led to organizations changing the way they think about data privacy management. Privacy Hub by Wrangu is a powerful and easy-to-use data privacy management software that solves these challenges at scale, allowing organizations to simplify their privacy program management in a single source of truth. Our data privacy management software, Privacy Hub, automates and harmonizes the disparate activities of various teams into one seamless outcome ensuring ongoing compliance.
  • 22
    Manetu

    Manetu

    Manetu

    The Manetu data crypto-vault provides enterprise class personal and sensitive data management services across critical business priorities. A repository where personal and, or sensitive data is ingested, secured and de-identified such that it can be used for analytics, testing, discovery and, other revenue generating capabilities. Data use across organizations compromises security, privacy and, consent. Needs a copy of the data to develop new applications to maintain good client satisfaction. Needs a copy of the data to run new sales plays, grow the business or deliver on goods and services. Needs a copy of the data for analysis to create new, targeted marketing campaigns. Needs a copy of the data to run reports on how the business is doing. Needs a copy of the data to develop new models and algorithms to drive margin expansion. These data usage models propagate risk as more exposure is created throughout an organization.
  • 23
    Iconfirm

    Iconfirm

    Iconfirm

    Ensuring high precision privacy provides greater opportunity for data-driven value creation and reduces the risk of a breach. This requires a systemic approach and to organize the work in the right way. Many organizations struggle with lack of competence and resources and a growing gap between policies and practice. This represents an unnecessary risk and organizations need to operationalize and automate. Privacy cannot be organized segregated from ordinary activities, but must be embedded where the processing of data actually happens. Iconfirm ensures efficient and structured collaboration between individuals, systems and organizations to automate privacy documentation and adherence. A high precision tool for consents or confirmations. Efficient management of data processors and vendors. Data subjects privacy portal builds trust and makes it easy to collaborate. Secure storage, sharing and automated erasure across systems.
  • 24
    Compliancelog

    Compliancelog

    Compliancelog

    Order a review of the system and see how easily and how quickly you get started with GDPR. Just as you have always had to keep accounts and submit annual accounts for your company, the new Personal Data Ordinance means that you must make a "data account". Unlike your financial accounts, you must not submit a report once a year, but you must be able to document what data you are in contact with, and you must be able to draw a report if the Danish Data Protection Agency takes you out for control. Just as it is by far the easiest to use an accounting system, you also make it easier for yourself if you use a system for your "data accounting". Compliancelog is that system. Compliancelog is the result of thousands of hours of collaboration between lawyers, designers, usability specialists and programmers. The Kingdom's most intuitive GDPR system. With ComplianceLog, you get everything you need to get a handle on the personal data ordinance.
    Starting Price: €499 per month
  • 25
    ComplyCloud

    ComplyCloud

    ComplyCloud

    GDPR is difficult but there is no reason it has to be incomprehensible too. This is why ComplyCloud holds all the features you need to maintain and document GDPR compliance. Nothing less. Make article 30 records with ease by checking off predefined suggestions or inserting information. Maintain the overview of the data processors on the records where you can categorize them and access all agreements. Map IT systems and connect processing activities with the applied IT systems. Create coherence of data in the records by using tags so the coherence can be seen across the organization and IT systems. GDPR compliance requires documentation of “responsibility”. With our software, all relevant documents from A-Z can be made directly in the software. Our software even updates the content of the documents automatically if anything new happens regarding guidance or best practice. The software itself knows what to ask so you only have to answer specific factual matters.
    Starting Price: $158.24 per month
  • 26
    Microsoft Customer Lockbox
    Most operations, support, and troubleshooting performed by Microsoft personnel and sub-processors do not require access to customer data. In those rare circumstances where such access is required, Customer Lockbox for Microsoft Azure provides an interface for customers to review and approve or reject customer data access requests. It is used in cases where a Microsoft engineer needs to access customer data, whether in response to a customer-initiated support ticket or a problem identified by Microsoft. Customer Lockbox logs are stored in activity logs. In the Azure portal, select Activity Logs to view auditing information related to Customer Lockbox requests. You can filter for specific actions. We've introduced a new baseline control (3.13) in Azure Security Benchmark that covers Customer Lockbox applicability. Customers can now leverage the benchmark to review Customer Lockbox applicability for a service.
  • 27
    uRISQ

    uRISQ

    uRISQ

    CSR Privacy Solutions Inc (CSR) is the world’s largest provider of privacy regulator compliance solutions for the small to medium business population. CSR’s team is comprised of experienced and certified privacy and security professionals. CSR's uRISQ cyber-privacy platform streamlines and documents your client’s compliance with mandated regulations, giving them peace of mind. Provides your clients with the peace of mind that every party is being notified and the right procedures are being performed to make sure all regulations are being met. Saves time and cost preventing the loss of extra revenue and time of operations. Reduces the risk of civil and/or criminal penalties due to incorrect reporting. Failure to properly report breaches leads to fines and criminal penalties. Offers a single point of contact to simplify the process of communication. Provides a key part of your incident response plan, allowing your clients to have all the necessary tools and plans of action.
  • 28
    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    The diagnostic allows you to assess your GDPR compliance level. It will help you identify areas for improvement, build an action plan, and prioritize the steps required to move smoothly through the compliance process. Work collaboratively and speed up processing mapping using built-in templates. Select standard processing activities or add new ones, complete the information required and validate to finalize processing mapping. Whether you’re contacting data subjects or processing their requests via secure authentication, it’s easy to manage and archive data subject requests from your employees, customers or service providers directly, all on a single platform. Discover the highly intuitive, simple and secure user interface. Automate your processes, map your processing activities and generate your record in a few clicks, easily manage and archive employee, customer and service provider DSRs. Use built-in templates to create standard contracts, clauses, emails et legal notices.
    Starting Price: €195 per month
  • 29
    Data Privacy Manager

    Data Privacy Manager

    Data Privacy Manager

    Our team of talented and skilled developers started working on Data Privacy Manager with a vision of creating a well-rounded data privacy platform that will be used by our clients to provide them with a single and unique 360 degrees view of their customers’ personal data lifecycle. Data Privacy Manager is a mature platform and is used in many different vertical markets, helping its users, both data controllers and data processors, to regain control over personal data they’ve been entrusted with. In addition to the traditional full-time Data Protection Officer (DPO) scenario, this product is also designed specifically to support the shared-DPO model, where different firms can buy the service of a single DPO, typically from legal or consulting firms. But the real value of this offering is the opportunity to manage security controls for data retention schedule and deletion of data.
  • 30
    GDPR Plus

    GDPR Plus

    GDPR Plus

    Say goodbye to manual tracking, enable sharing, and secure storing of data. Mighty Trust’s Data Protection Software solutions centralize your accountability requirements for data protection, security, and compliance laws in different jurisdictions. We streamline, centralize, and control everything from consent management to data sharing, allowing your business to operate as a privacy-forward organization. GDPR Plus Software is our data protection & management software containing our proprietary process for GDPR. The product is offered in the cloud, on premises or can be accessed as part of our managed service solution. Our Activity monitoring functionality helps organizations determine who has access to personal data and when it is being accessed or processed. These solutions come with the following features to help manage activity.
MongoDB Logo MongoDB